china-unicom

v0.1.0

Information assistant for 中国联通 China Unicom. Search products, news, financials, and official resources for 中国联通 China Unicom.

0· 29·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (China Unicom information assistant) aligns with the instructions: performing web searches, prioritizing official sources, and presenting results. No unrelated credentials, binaries, or installs are requested.
Instruction Scope
SKILL.md instructs only to identify the user's query, use web search tools, prioritize https://www.chinaunicom.com, and present structured results. It does not ask the agent to read local files, access unrelated environment variables, or transmit data to unknown endpoints.
Install Mechanism
No install spec and no code files — instruction-only. Nothing is written to disk and no external packages are fetched by the skill itself.
Credentials
The skill declares no required environment variables, credentials, or config paths. There is no disproportionate credential request for the stated functionality.
Persistence & Privilege
always is false (not force-included). The skill is user-invocable and allows normal autonomous invocation, which is expected for skills of this type and is not combined with broad access.
Assessment
This skill is internally consistent and only asks the agent to search public web sources for China Unicom information. Before enabling, consider: 1) verify that results cite official/authoritative sources (the skill prioritizes chinaunicom.com but web search results vary); 2) instruct the agent if you want citations only from certain regions/languages or to avoid paywalled sources; and 3) be aware that the skill may surface third-party news or financial data that should be independently verified for critical decisions. No sensitive credentials are required by the skill itself.

Like a lobster shell, security has layers — review code before you run it.

latestvk9738v6ctsnvyec7b7nasd9t4s845ap9

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🏢 Clawdis

Comments